Unit 5
Unit 5
Syllabus
• Application layer
• HTTP,
• FTP,
• SMTP,
• DNS.
• Network security:
• Common Threats- Firewalls (advantages and disadvantages),
• Cryptography.
Application Layer
• 7th Layer.
• In a timesharing environment, users are part of the system with some right
to access resources
• To access the system, the user logs into the system with a user id or log-in
name. The system also includes password checking to prevent an
unauthorized user from accessing th~ resources.
Local login
Remote Login
• The user sends the keystrokes to the terminal driver, where the local
operating system accepts the characters but does not interpret them.
• The characters are sent to the TELNET client, which transforms the
characters to a universal character set called network virtual terminal (NVT)
characters and delivers them to the local TCP/IP protocol stack.
• The commands or text, in NVT form, travel through the Internet and
arrive at the TCP/IP stack at the remote machine.
• Here the characters are delivered to the operating system and passed to
the TELNET server, which changes the characters to the
corresponding characters understandable by the remote computer.
• However, the characters cannot be passed directly to the operating
system because the remote operating system is not designed to receive
characters from a TELNET server:
• The server TELNET, on the other hand, translates data and commands
from NVT form into the form acceptable by the remote computer
SMTP
• Simple Mail Transfer Protocol
• connection-oriented scenario.
• The SMTP client, the initiating agent, sender, or transmitter, initiates the
communication session.
• It issues the command strings and opens the session for corresponding responses
from the SMTP server, which involves the listening agent or receiver.
SMTP email transaction follows four
command
1.HELO/EHLO command
• It tells the email server that the
client wants to start the mail
transaction. The client mentions
its domain name after this
command.
2. MAIL command
• Specifies the sender of the email
• It lays down the bounce address/return address, defining the return or
reverse paths.
3.RCPT command
• It specifies the recipient of the message.
4. DATA
• It shows where the content of the message starts
Components of SMTP
User-Agent (UA)
• The Mail Transfer Agent (MTA) then transfers this message to the
recipient across the internet.
How are emails sent using SMTP?
1. Composition
• With the help of a Mail User Agent (MUA) program, the user sends an
email. The content of the email consists of two parts, the email header and
the email body.
2. Submission
• The mail client (mail user agent, MUA) submits the email to a mail server
(known as a mail submission agent, MSA). The MSA further delivers the
mail to its mail transfer agent, MTA.
3. Mail delivery
• The two parts of an email address are the recipient’s username and the
domain name.
• For example, [email protected], ‘Mayank’ is the username, and
‘gmail.com’ is the domain.
• If the domain name of the recipient’s email address does not match the
sender’s domain name, then the MTA will search for the particular domain
to relay the mail.
• This email transfer from one SMTP server to another is called an SMTP
relay.
4. Receipt and processing
• The user can access the MUA with the login and password. In
addition, the MUA helps retrieve the email stored by the MDA.
DNS
DNS
• This hierarchical naming system is essential for organizing the vast number
of domains on the internet and ensuring unique domain names.
• The hierarchy flows from general (the root) to specific (host names or
individual resources).
Sections of Domain Name
1. Root Level
• It is the starting point of the domain name space, managing the top-
level domains.
• Directly below the root, TLDs are the most general part of a domain
name (e.g., .com, .org, .net, country-specific like .uk or .in).
3. Subdomain
• A part of the domain that is a subdivision of the second-level domain.
Organizations can create multiple subdomains to represent different
services, departments, or functions.
• The host name is usually the first part of the full domain.
• It includes the entire domain name from the host to the top-level
domain (TLD), and it ends with a dot representing the root of the DNS
hierarchy.
Characteristics of an FQDN:
• Complete
• Ends with a dot
• Globally Unique
Partially Qualified Domain Name (PQDN)
• It may omit parts like the top-level domain (TLD) or the root dot.
Characteristics of a PQDN
1.Incomplete
2.Relative Resolution
3.Local Scope
Resolution.
corresponds to.
The query goes to a recursive DNS server, which is also called a recursive
resolver, and is usually managed by the internet service provider (ISP).
If the recursive resolver has the address, it will return the address to the
user, and the webpage will load.
If the recursive DNS server does not have an answer, it will query a series
of other servers in the following order:
DNS root name servers,
contains the queried IP address. It sends this information to the recursive DNS server and the webpage the
DNS root name servers and TLD servers primarily redirect queries and rarely provide the resolution
themselves.The recursive server/resolver stores, or caches, the a record for the domain name, which
The next time it receives a request for that domain name, it can respond directly to the user instead of
If the query reaches the authoritative server and it cannot find the information, it returns an error message.
Network Security
• Confidentiality: Ensuring that data is accessible only to authorized users or
systems.
• Integrity: Protecting data from being altered, tampered with, or destroyed without
authorization.
• Availability: Ensuring that network services and data are available to authorized
users when needed.
• Authentication: Verifying the identity of users or systems to ensure that only
legitimate entities are granted access.
• Non-repudiation: Preventing a sender or receiver from denying the transmission
or reception of a message.
Types of Attacks
Traffic Analysis:
• The attacker secretly intercepts and alters communication between two parties
without them knowing.
• The attacker floods a target server, network, or service with excessive traffic,
overwhelming its resources and rendering it unavailable to legitimate users.
Overloading a website’s server with excessive requests to make it crash.
Firewalls
Access Control: They decide which applications, services, and devices can
access the network, thus protecting sensitive resources.
Threat Detection: Some of them can detect and prevent other types of
threats, such as viruses, malware, or even suspicious behavior.
Advantages and Disadvantages of
Firewalls
Cryptography
• The sender uses an encryption algorithm, and the receiver uses a decryption
algorithm.
Cipher
• The sender uses this key and an encryption algorithm to encrypt data;
• The receiver uses the same key and the corresponding decryption
• If the key is compromised, all communications encrypted with that key are
vulnerable.
Asymmetric-Key Cryptography
• In asymmetric or public-key cryptography, there are two keys: a private key
and a public key.
• In the Figure imagine Alice wants to send a message to Bob. Alice uses the
public key to encrypt the message. When the message is received by Bob,
the private key is used to decrypt the message.
Three Types of Keys
Comparison
• Encryption can be thought of as electronic locking; decryption as electronic unlocking.
• The sender puts the message in a box and locks the box by using a key; the receiver
unlocks the box with a key and takes out the message.
• The difference lies in the mechanism of the locking and unlocking and the type of keys
used.
• In symmetric-key cryptography, the same key locks and unlocks the box. In asymmetric-
key cryptography, one key locks the box, but another key is needed to unlock it.
SYMMETRIC-KEY CRYPTOGRAPHY-
Traditional Ciphers